Jeremiah Blocki
Orcid: 0000000255424674Affiliations:
 Purdue University, Department of Computer Science, West Lafayette, IN, USA
 Microsoft Research, Cambridge, MA, USA (former)
 Carnegie Mellon University, Pittsburgh, PA, USA (former, PhD 2014)
According to our database^{1},
Jeremiah Blocki
authored at least 74 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:

on zbmath.org

on linkedin.com

on cs.cmu.edu

on twitter.com

on orcid.org
On csauthors.net:
Bibliography
2024
J. Cryptol., June, 2024
Inf. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
2023
CoRR, 2023
Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the 38th Computational Complexity Conference, 2023
How to Make Your Approximation Algorithm Private: A BlackBox DifferentiallyPrivate Transformation for Tunable Approximation Algorithms of Functions with Low Sensitivity.
Proceedings of the Approximation, 2023
2022
Proc. Priv. Enhancing Technol., 2022
The Parallel Reversible Pebbling Game: Analyzing the PostQuantum Security of iMHFs.
IACR Cryptol. ePrint Arch., 2022
Sustained Space and Cumulative Complexity Tradeoffs for DataDependent MemoryHard Functions.
IACR Cryptol. ePrint Arch., 2022
Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision.
CoRR, 2022
Proceedings of the 39th International Symposium on Theoretical Aspects of Computer Science, 2022
Proceedings of the 49th International Colloquium on Automata, Languages, and Programming, 2022
Proceedings of the Advances in Cryptology  EUROCRYPT 2022  41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
IEEE Trans. Inf. Theory, 2021
MemoryHard Puzzles in the Standard Model with Applications to MemoryHard Functions and ResourceBounded Locally Decodable Codes.
IACR Cryptol. ePrint Arch., 2021
CoRR, 2021
Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage.
Comput. Secur., 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Private and ResourceBounded Locally Decodable Codes for Insertions and Deletions.
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the 12th Innovations in Theoretical Computer Science Conference, 2021
Proceedings of the GPCE '21: Concepts and Experiences, Chicago, IL, USA, October 17, 2021
Password Strength Signaling: A CounterIntuitive Defense Against Password Cracking.
Proceedings of the Decision and Game Theory for Security  12th International Conference, 2021
Exponential Lower Bounds for Locally Decodable and Correctable Codes for Insertions and Deletions.
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the 2nd Conference on InformationTheoretic Cryptography, 2021
2020
CoRR, 2020
CoRR, 2020
CoRR, 2020
CoRR, 2020
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020
Proceedings of the 1st Conference on InformationTheoretic Cryptography, 2020
Proceedings of the 40th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2020
2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Brief Announcement: Relaxed Locally Correctable Codes in Computationally Bounded Channels.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the TwentyNinth AAAI Conference on Artificial Intelligence, 2015
2014
CoRR, 2014
CoRR, 2014
2013
Proceedings of the fourteenth ACM Conference on Electronic Commerce, 2013
Differentially private data analysis of social networks via restricted sensitivity.
Proceedings of the Innovations in Theoretical Computer Science, 2013
Proceedings of the IJCAI 2013, 2013
Proceedings of the Decision and Game Theory for Security  4th International Conference, 2013
Proceedings of the AISec'13, 2013
2012
Proceedings of the Decision and Game Theory for Security  Third International Conference, 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
2011
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security  7th International Conference, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
2010
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010